MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d852901bdc93f05c0dbb9692dfe08ca5465dadce441ef722b617314578fd5c0f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RaccoonStealer


Vendor detections: 9


Intelligence 9 IOCs 2 YARA 3 File information Comments

SHA256 hash: d852901bdc93f05c0dbb9692dfe08ca5465dadce441ef722b617314578fd5c0f
SHA3-384 hash: 06f723b5cdf36964cafe52e3e5d01aa80b746df3443fe230bb46cbbf4856382d9d9a9cd7348e9aa00a093feb1dda26f2
SHA1 hash: f859e35cfc93447fa74feffc036510ca23f4f0e4
MD5 hash: 2e066855f5af48f4402ee0134d5d2d7d
humanhash: twelve-one-winter-alaska
File name:2e066855f5af48f4402ee0134d5d2d7d.exe
Download: download sample
Signature RaccoonStealer
File size:246'784 bytes
First seen:2021-09-30 03:00:59 UTC
Last seen:2021-09-30 04:11:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash a9e1103bbc08b87eea5d7311fb0b7c3e (4 x RaccoonStealer, 4 x ArkeiStealer, 3 x RedLineStealer)
ssdeep 3072:5rQd6iUvkPcgYnpvzaHWg9MjLF0w2UyojHO8VFl9HHTKX2Lk:add91YnRWHjMjtLOIF2X
Threatray 4'685 similar samples on MalwareBazaar
TLSH T110349E107BE0C035F1B712BB497593B9A53DBEF1AB2491CB62C42AEA5A346D0ED30747
File icon (PE):PE icon
dhash icon 60f8e8e8aa66a499 (4 x RedLineStealer, 4 x RaccoonStealer, 2 x Stop)
Reporter abuse_ch
Tags:exe RaccoonStealer


Avatar
abuse_ch
RaccoonStealer C2:
http://91.219.236.162/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://91.219.236.162/ https://threatfox.abuse.ch/ioc/228192/
185.80.53.81:15667 https://threatfox.abuse.ch/ioc/228316/

Intelligence


File Origin
# of uploads :
2
# of downloads :
109
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
2e066855f5af48f4402ee0134d5d2d7d.exe
Verdict:
Suspicious activity
Analysis date:
2021-09-30 03:04:28 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Raccoon RedLine SmokeLoader Tofsee
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Antivirus detection for dropped file
Benign windows process drops PE files
Changes security center settings (notifications, updates, antivirus, firewall)
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Deletes itself after installation
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the windows firewall
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Performs DNS queries to domains with low reputation
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sigma detected: Copying Sensitive Files with Credential Data
Sigma detected: Suspect Svchost Activity
Sigma detected: Suspicious Svchost Process
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Uses known network protocols on non-standard ports
Uses netsh to modify the Windows network and firewall settings
Yara detected Raccoon Stealer
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Tofsee
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 493908 Sample: atis6bbo32.exe Startdate: 30/09/2021 Architecture: WINDOWS Score: 100 87 91.219.236.162, 49835, 80 SERVERASTRA-ASHU Hungary 2->87 89 t.me 149.154.167.99, 443, 49833 TELEGRAMRU United Kingdom 2->89 91 5 other IPs or domains 2->91 139 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->139 141 Antivirus detection for dropped file 2->141 143 System process connects to network (likely due to code injection or exploit) 2->143 145 19 other signatures 2->145 11 atis6bbo32.exe 2->11         started        14 eehweju 2->14         started        16 svchost.exe 2->16         started        18 8 other processes 2->18 signatures3 process4 dnsIp5 155 Detected unpacking (changes PE section rights) 11->155 21 atis6bbo32.exe 11->21         started        157 Multi AV Scanner detection for dropped file 14->157 159 Machine Learning detection for dropped file 14->159 24 eehweju 14->24         started        161 Changes security center settings (notifications, updates, antivirus, firewall) 16->161 93 127.0.0.1 unknown unknown 18->93 95 192.168.2.1 unknown unknown 18->95 signatures6 process7 signatures8 147 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 21->147 149 Maps a DLL or memory area into another process 21->149 151 Checks if the current machine is a virtual machine (disk enumeration) 21->151 153 Creates a thread in another existing process (thread injection) 21->153 26 explorer.exe 15 21->26 injected process9 dnsIp10 97 193.56.146.41, 49781, 9080 LVLT-10753US unknown 26->97 99 216.128.137.31, 80 AS-CHOOPAUS United States 26->99 101 2 other IPs or domains 26->101 79 C:\Users\user\AppData\Roaming\eehweju, PE32 26->79 dropped 81 C:\Users\user\AppData\Local\Temp46.exe, PE32 26->81 dropped 83 C:\Users\user\AppData\Local\Temp\4AA6.exe, PE32 26->83 dropped 85 5 other malicious files 26->85 dropped 179 System process connects to network (likely due to code injection or exploit) 26->179 181 Benign windows process drops PE files 26->181 183 Deletes itself after installation 26->183 185 Hides that the sample has been downloaded from the Internet (zone.identifier) 26->185 31 E46.exe 15 6 26->31         started        36 2897.exe 26->36         started        38 19D0.exe 26->38         started        40 2 other processes 26->40 file11 signatures12 process13 dnsIp14 111 ipapi.co 104.26.8.44, 443, 49782 CLOUDFLARENETUS United States 31->111 73 C:\Users\user\AppData\Roaming46.exe, PE32 31->73 dropped 113 Antivirus detection for dropped file 31->113 115 Multi AV Scanner detection for dropped file 31->115 117 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 31->117 133 2 other signatures 31->133 42 E46.exe 31->42         started        119 Detected unpacking (changes PE section rights) 36->119 121 Machine Learning detection for dropped file 36->121 123 Contains functionality to inject code into remote processes 36->123 125 Injects a PE file into a foreign processes 36->125 46 2897.exe 36->46         started        75 C:\Users\user\AppData\Local\...\ztcmzcht.exe, PE32 38->75 dropped 127 Detected unpacking (overwrites its own PE header) 38->127 135 2 other signatures 38->135 48 cmd.exe 38->48         started        51 cmd.exe 38->51         started        53 sc.exe 38->53         started        59 3 other processes 38->59 129 Query firmware table information (likely to detect VMs) 40->129 131 Tries to detect sandboxes and other dynamic analysis tools (window names) 40->131 137 2 other signatures 40->137 55 3133.exe 2 40->55         started        57 conhost.exe 40->57         started        61 2 other processes 40->61 file15 signatures16 process17 dnsIp18 103 185.203.242.21, 49873, 80 ON-LINE-DATAServerlocation-NetherlandsDrontenNL Ukraine 42->103 105 172.67.69.226, 443, 49825, 49855 CLOUDFLARENETUS United States 42->105 109 2 other IPs or domains 42->109 163 Antivirus detection for dropped file 42->163 165 Multi AV Scanner detection for dropped file 42->165 167 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 42->167 177 5 other signatures 42->177 169 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 46->169 171 Maps a DLL or memory area into another process 46->171 173 Checks if the current machine is a virtual machine (disk enumeration) 46->173 175 Creates a thread in another existing process (thread injection) 46->175 77 C:\Windows\SysWOW64\...\ztcmzcht.exe (copy), PE32 48->77 dropped 63 conhost.exe 48->63         started        65 conhost.exe 51->65         started        67 conhost.exe 53->67         started        107 188.72.208.174, 38430, 49857 WEBZILLANL Netherlands 55->107 69 conhost.exe 59->69         started        71 conhost.exe 59->71         started        file19 signatures20 process21
Threat name:
Win32.Ransomware.Stop
Status:
Malicious
First seen:
2021-09-30 03:01:38 UTC
AV detection:
17 of 27 (62.96%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:raccoon family:redline family:smokeloader family:tofsee family:xmrig botnet:5ff0ccb2bc00dc52d1ad09949e9c7663bc9ca4d4 botnet:second build backdoor discovery evasion infostealer miner persistence spyware stealer themida trojan
Behaviour
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Delays execution with timeout.exe
Enumerates physical storage devices
Launches sc.exe
Drops file in System32 directory
Suspicious use of NtSetInformationThreadHideFromDebugger
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Checks whether UAC is enabled
Checks BIOS information in registry
Deletes itself
Loads dropped DLL
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Themida packer
Creates new service(s)
Downloads MZ/PE file
Executes dropped EXE
Modifies Windows Firewall
Sets service image path in registry
Identifies VirtualBox via ACPI registry values (likely anti-VM)
XMRig Miner Payload
Raccoon
RedLine
RedLine Payload
SmokeLoader
Tofsee
Windows security bypass
xmrig
Malware Config
C2 Extraction:
http://fiskahlilian16.top/
http://paishancho17.top/
http://ydiannetter18.top/
http://azarehanelle19.top/
http://quericeriant20.top/
asyndenera.xyz:15667
Unpacked files
SH256 hash:
592b089027938156e18387e4402b965a5f1ffc25e96d7efc3aa9331254587bdd
MD5 hash:
2dbb1eb8c40c88994738a736ad55c79b
SHA1 hash:
88e2fc9242606c7dfcd68d5da8c6d457837157a3
SH256 hash:
d852901bdc93f05c0dbb9692dfe08ca5465dadce441ef722b617314578fd5c0f
MD5 hash:
2e066855f5af48f4402ee0134d5d2d7d
SHA1 hash:
f859e35cfc93447fa74feffc036510ca23f4f0e4
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_SUSPICIOUS_EXE_Referenfces_Messaging_Clients
Author:ditekSHen
Description:Detects executables referencing many email and collaboration clients. Observed in information stealers
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:win_raccoon_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:Detects win.raccoon.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RaccoonStealer

Executable exe d852901bdc93f05c0dbb9692dfe08ca5465dadce441ef722b617314578fd5c0f

(this sample)

  
Delivery method
Distributed via web download

Comments